summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl.h')
-rw-r--r--src/lib/libssl/ssl.h45
1 files changed, 1 insertions, 44 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h
index 0301fd0b96..5ea440231a 100644
--- a/src/lib/libssl/ssl.h
+++ b/src/lib/libssl/ssl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl.h,v 1.60 2014/07/10 11:58:08 jsing Exp $ */ 1/* $OpenBSD: ssl.h,v 1.61 2014/07/11 09:24:44 beck Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -460,10 +460,6 @@ struct ssl_session_st {
460 unsigned int sid_ctx_length; 460 unsigned int sid_ctx_length;
461 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; 461 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
462 462
463#ifndef OPENSSL_NO_PSK
464 char *psk_identity_hint;
465 char *psk_identity;
466#endif
467 /* Used to indicate that session resumption is not allowed. 463 /* Used to indicate that session resumption is not allowed.
468 * Applications can also set this bit for a new session via 464 * Applications can also set this bit for a new session via
469 * not_resumable_session_cb to disable session caching and tickets. */ 465 * not_resumable_session_cb to disable session caching and tickets. */
@@ -835,14 +831,6 @@ struct ssl_ctx_st {
835 int (*tlsext_status_cb)(SSL *ssl, void *arg); 831 int (*tlsext_status_cb)(SSL *ssl, void *arg);
836 void *tlsext_status_arg; 832 void *tlsext_status_arg;
837 833
838#ifndef OPENSSL_NO_PSK
839 char *psk_identity_hint;
840 unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
841 char *identity, unsigned int max_identity_len, unsigned char *psk,
842 unsigned int max_psk_len);
843 unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
844 unsigned char *psk, unsigned int max_psk_len);
845#endif
846 834
847 835
848 836
@@ -955,30 +943,6 @@ void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data,
955#define OPENSSL_NPN_NO_OVERLAP 2 943#define OPENSSL_NPN_NO_OVERLAP 2
956#endif 944#endif
957 945
958#ifndef OPENSSL_NO_PSK
959/* the maximum length of the buffer given to callbacks containing the
960 * resulting identity/psk */
961#define PSK_MAX_IDENTITY_LEN 128
962#define PSK_MAX_PSK_LEN 256
963void SSL_CTX_set_psk_client_callback(SSL_CTX *ctx,
964 unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
965 char *identity, unsigned int max_identity_len, unsigned char *psk,
966 unsigned int max_psk_len));
967void SSL_set_psk_client_callback(SSL *ssl,
968 unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
969 char *identity, unsigned int max_identity_len, unsigned char *psk,
970 unsigned int max_psk_len));
971void SSL_CTX_set_psk_server_callback(SSL_CTX *ctx,
972 unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
973 unsigned char *psk, unsigned int max_psk_len));
974void SSL_set_psk_server_callback(SSL *ssl,
975 unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
976 unsigned char *psk, unsigned int max_psk_len));
977int SSL_CTX_use_psk_identity_hint(SSL_CTX *ctx, const char *identity_hint);
978int SSL_use_psk_identity_hint(SSL *s, const char *identity_hint);
979const char *SSL_get_psk_identity_hint(const SSL *s);
980const char *SSL_get_psk_identity(const SSL *s);
981#endif
982 946
983#define SSL_NOTHING 1 947#define SSL_NOTHING 1
984#define SSL_WRITING 2 948#define SSL_WRITING 2
@@ -1123,13 +1087,6 @@ struct ssl_st {
1123 int error_code; /* actual code */ 1087 int error_code; /* actual code */
1124 1088
1125 1089
1126#ifndef OPENSSL_NO_PSK
1127 unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
1128 char *identity, unsigned int max_identity_len, unsigned char *psk,
1129 unsigned int max_psk_len);
1130 unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
1131 unsigned char *psk, unsigned int max_psk_len);
1132#endif
1133 1090
1134 SSL_CTX *ctx; 1091 SSL_CTX *ctx;
1135 /* set this flag to 1 and a sleep(1) is put into all SSL_read() 1092 /* set this flag to 1 and a sleep(1) is put into all SSL_read()